1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
5

Un comerciante de régimen código para comprar mercancías gravadas a un comerciante de régimen simplificado precio de venta al pú

blico 1.800.000 incluido el IVA tarifa general (19%)
Computers and Technology
1 answer:
Genrish500 [490]3 years ago
5 0

Answer:

El valor sin impuestos de las mercancías era de $1.512.605.

Explanation:

Dado que un comerciante de régimen código para comprar mercancías gravadas a un comerciante de régimen simplificado pagó un precio de venta al público 1.800.000 incluido el IVA tarifa general (19%), para determinar el valor de las mercancías sin el impuesto incluido se debe realizar el siguiente cálculo:

1.19 = 1.800.000

1 = X

1.800.000 / 1.19 = X

1.512.605 = X

Por lo tanto, el valor sin impuestos de las mercancías era de $1.512.605.

You might be interested in
The scope of a variable declared in a for loop's initialization expression always extends beyond the body of the loop
shtirl [24]

Answer:

False

Explanation:

for loop is used to run the statement again and again until the condition put inside the for loop is false.

syntax:

for(initialization;condition;increment/decrement)

{

  statement;

}

the initialization scope is valid only within the curly braces of the for loop. it is not valid outside the body of the for loop.

because initialization is the part of the for loop.

4 0
3 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
3 years ago
. ____ view displays the slides so that they almost fill the screen, and a status bar appears identifying the number of the curr
Mars2501 [29]
Reading view.  i checked on powerpoint

4 0
3 years ago
Drag each tile to the correct box.
saw5 [17]

ISDN – improvement over dial-up; DSL – uses a higher frequency than a voice call; dial-up – makes your phone-line busy; cable internet – uses coaxial television cables; mobile internet – uses the cellular network are the different types of internet connection.

<h3>What is an internet connection?</h3>

The technology and systems of connectivity that allow a user to get access to the internet is known as an internet connection. There are different types of internet connection based on their technologies.

Hence, the different types of internet connection with their functionalities are mentioned above.

Learn more about internet connection here:

brainly.com/question/9380870

#SPJ1

7 0
2 years ago
It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409
Furkat [3]

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

4 0
3 years ago
Other questions:
  • Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex vv has a limit l(v)l(v)
    7·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    14·1 answer
  • What allows windows to quickly be resized by clicking the title bar of the window and dragging it to the top, sides, or middle o
    9·1 answer
  • What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out ano
    9·1 answer
  • after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?
    5·1 answer
  • Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
    11·2 answers
  • The ____ command is used to disconnect a datatable object from the database. (
    15·2 answers
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
  • Help I will mark BRAINLIEST !<br> Explain looping as an invention strategy. Why is it helpful?
    12·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!